File systems security: Shared folders & NTFS permissions, EFS Disk Quotas
|
|
- Chad Norton
- 8 years ago
- Views:
Transcription
1 File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (November 2, 2015) Abdou Illia, Fall Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS Permissions Understand EFS Understand Disk Quotas 2 FAT vs. NTFS Decision about what file system to use depends on: Whether multiple OS will be installed on the computer Security requirements for the system FAT Supports partitions up to 4 GB (FAT16) and 2 TB (FAT32) Provides only folder-level security Allows limited permission setting (Read, Change, Full Control) NTFS Supports lager partitions size than FAT (w/o disk performance decrease) File-level and Folder-level security Data compression File encryption (Encrypting File System) Disk quotas management Needed for AD services Faster access to data Remote storage: provides an extension to your disk space by making removable media (such as tapes) more accessible. Note: Windows and MS-DOS-based applications can read compressed files because they are automatically decompressed by NTFS when requested. 3 1
2 Shared Folder? A folder used to provide network users with access to file resources. When a folder is shared on a server, users can connect to the server and gain access to the files it contains. 4 Shared Folders Requirements for creating a shared folder: Any supported File system (FAT, NTFS) If server in a domain, you must be Administrator or Server Operator If server in a workgroup, you must be Administrator or Power user If client computer running a workstation OS, you must be Administrator or Power user Note: Users that are granted the Create Permanent Shared Objects right can also create shared folders on the computer where the right is assigned To see all shared folders on a computer: 1) Click Start. Then click Run 2) Type \\ComputerName (where ComputerName is a valid network computer name like SRVDC18) 3) Click OK. OR 1) Open Computer Management 2) In the console tree, double-click Shared Folders 3) Click Shares To share a folder on a computer: 1) Open My Computer (Right-click/Open) 2) Select a disk, then the folder to share 3) Right-click the selected folder 4) Click Properties 5) Click the Sharing tab 6) Check Share this folder 7) Click Apply, and then OK. 5 Shared folder permissions A shared folder can contain application programs, data or other users personnel data Each type of data can require different permissions Shared Folder Subfolder 1 Subfolder 2 Subfolder 3 Subfolder 4 File 1 File 2 File 3 With FAT, permissions could only be set for folders, not for individual files If permissions at file level are required, you need to use NTFS permissions 6 2
3 Shared Folder Permissions Read - Display folder names, filenames, file data and attributes - Run program files Change Read permission + - Create folders, add files to folders, change data in files, append data to files, change files attributes, delete folders and files. Full Control Change permission + - Change file permissions and take ownership of files Shared folder permissions do not restrict access to users who gain access to the folder at the computer where the folder is stored. Shared folder permissions are the only way to secure network resources on FAT partitions. The default folder permission is Read for Everyone. You can allow or deny shared folder permissions to individual users or to user groups. 7 Assigning Shared Folders permissions 1) Open My Computer (Right-click/Open) 2) Select the disk, then the folder 3) Right-click the selected folder 4) Click Properties 5) Click the Sharing tab 6) Click Permissions 7) Assign permissions 8) Click OK, and then OK. 8 Shared Folder Permissions Rules Multiple Permissions (The Combination Rule) If a user is assigned a permission for a Shared folder and If the use user belongs to a group to which a different permission is assigned, Then the user s effective permissions are the combination of the user and group permissions Deny overrides Allow If you deny a shared folder permission to a user and If you allow the same permission to a group the user belongs to Then the user will not have that permission. Copying or Moving Shared folders If you copy a Shared folder, the original folder is shared but not the copy If you move a Shared folder, it is no longer shared. 9 3
4 Guidelines for Shared Folder Permissions Determine which groups need access to each resource and the level of access they require. Assign permissions to groups instead of user accounts to simplify access administration. Assign the most restrictive permissions that still allow users to perform required tasks. Use intuitive share names so that users can easily recognize and locate resources. 10 Administrative & Hidden shares Administrative shares (created by default): All hard drives are shared as C$, D$, etc. The system folder (\WINDOWS) is shared as Admin$ Driver s folder for printers (\Winnt\System32\Spool\Drivers) is shared as Print$ Hidden shares (created by users) Share name should end with $ for the share to be hidden Not visible by other users unless they know the name If a user knows the name of a hidden share, he/she can access the share using the UNC name Start/Run. Then type \\ComputerName\ShareName$ Universal Naming Convention (UNC) name 11 NTFS permissions If permissions at file level are required, and/or If more specific permissions are required Then, NTFS permissions must be used Assigning NTFS permissions 1) Open My Computer (Right-click/Open) 2) Select the disk, then the folder/file to share 3) Right-click the selected folder or file 4) Click Properties 5) Click the Security tab 6) Assign permissions 7) Click Apply, and then OK. 12 4
5 Standard NTFS permissions Read User can open and view content of files/folders. They can also view objects ownership, assigned permissions, and objects attributes (Read-Only, Hidden, etc.) Write Read permission + - Create new files/subfolders in a folder - Change attributes List Folder Contents Can only view names of folders/files Read and Execute Read and List Folder Content permissions + - Ability for users to navigate through folders for which they don t have permission in order to get files and subfolders for which they do have permissions. Modify Read + Write + Read and Execute permissions (Users can view, create, delete, modify content of folders, etc.) Full Control Users can do everything 13 Extended NTFS permissions Execute File List Folder / Read File Read Attributes Read Extended Attributes Create Files / Write Data Write Attributes Write Extended Attributes Delete Subfolders and Files Read Permissions Change Permissions Take Ownership 14 NTFS permissions With NTFS permissions, you have an ACL for each resource (Folder, file, etc.) you can assign permissions for. Access Control List User1 User 2.. Execute File, etc. Read File, etc. Folder SubFolder1 File1.txt File2.txt SubFolder2 File1.doc File2.exe SubFolder3 15 5
6 Golden rule Exception to Golden rule NTFS Permissions Rules Multiple Permissions NTFS file permissions take priority over NTFS folder permissions A user can always access files for which he/she has permissions using UNC. E.g. \\SRVDC16\Data\file1.txt Denying a permission for a user blocks that permission, even if the permission is granted to a group the user belongs to. Permission Inheritance By default, permissions assigned for the parent folder are inherited at subfolder and file level To prevent automatic inheritance, explicit permissions assignments must be done at subfolder and/or file levels. Copying or Moving Files and Folders When a file/folder is copied or moved to another NTFS partition on a different physical disk, it inherits the permissions & attributes from the destination folder When a file/folder is moved within an NTFS partition, it retains its permissions When a file/folder is moved to another NTFS partition on the same physical disk it retains its permissions 16 When a file/folder is copied to a FAT partition, it loses its NTFS permissions Shares & permissions: Recap Sharing folders/files Setting permissions FAT NTFS FAT NTFS Folders/Subfolders YES YES YES (but limited) YES Files NO NO NO YES 17 Encrypting File System EFS is used to encrypt data in order to prevent intruders to read. The Golden rule do not apply to encrypted files/folders EFS is used to encrypt data stored on storage media or data in transit 18 6
7 Why use EFS? With NTFS permission, if someone is given the Take Ownership permission on your file/folder, they can log on, take the ownership of the file/folder, and then change permissions the way they want to. With EFS, in addition to access rights, a deencryption key is needed to read a file*. If someone got a copy of your file, or took ownership of it, they cannot read its content. Note 1: * When you logon, a private de-encryption key is automatically issued to you by W Note 2: Only the file/folder s creator or the Recovery Agent (the Administrator) can decrypt the file/folder How to encrypt a folder 1. Right-click the folder you want to encrypt 2. Click Properties 3. In General tab, click the Advanced button Note 1: The command line cipher could also be used to encrypt Note 2: Golden rule doesn t apply to encrypted files/folders 20 Exercise Create a user account for yourself with the username last (where last is your last name) Log off as Administrator, and logon using the last user account you have created Create a folder called Lab3-XX (where XX is your computer number) directly under the root of the C: drive. Encrypt the Lab3-XX folder Answer the following questions If you copy the encrypted folder to another NTFS partition, it will loose it encryption properties. T F Another user logon to your network. That user can read your encrypted file only if he/she took ownership of your encrypted file, and changed the permissions. T F 21 7
8 Disk Quotas Disk Quotas needed because Many users save data on shared folders Users must be prevented from filling disk capacity Disk Quotas options Enable Disk quotas w/o limiting disk usage Set a default quota for all users (per-volume basis) Set quotas on per-user basis Note: Disk Quotas only available on NTFS partitions 22 Enable/Configure Disk Quotas 1) Open My Computer 2) Right-click the volume, and click Properties 3) Click Quota tab 4) Enable quotas management 5) Configure Disk quotas 23 Disk Quota Parameters Enable quota management: Sets up quota management and starts tracking disk usage Deny disk space to users exceeding quota limits: Users can t write new information after reaching their quotas Do not limit disk usage: Tracks disk usage without imposing quotas Limit disk space to: Sets the default amount of disk space for all users 24 8
9 Disk Quota Parameters (continued) Set warning level to: Sets the default disk space that users can occupy that will trigger a warning message Log event when a user exceeds their quota limit: An event is entered in the System log when a user reaches his or her quota Log event when the user exceeds the warning level: An event is entered in the System log when a user receives a warning that he or she is approaching the quota 25 Delete a Quota entry 1) Open My Computer 2) Right-click the volume, and click Properties 3) Click Quota tab 4) Click the Quota Entries button 5) Right-click the appropriate user account 6) Click Delete 26 Other slides: - Configuring Auditing - Taking ownership 27 9
10 Configuring Auditing Auditing allows to keep track of events like Write, Create, Delete, Append, etc. on folders/files Need to implement auditing on folders and files that involve sensitive information (accounting, payroll, research projects, etc.) 28 Configuring Auditing 1) Right-click the folder/file you want to audit 2) Click Properties 3) Click Security tab 4) Click Advanced button 5) Click Auditing tab in the Access Control Settings dialog box, and click Add 6) Double-click the group or user you want to audit 7) Check the Successful or Failed events to audit 8) Click OK as many times as needed. 29 Taking ownership Note: If you are the owner of a folder/file (or have the Take ownership permission), you can change other users permissions 1) Right-click the folder/file you want to take ownership 2) Click Properties 3) Click Security tab 4) Click Advanced button 5) Click Owner tab in the Access Control Settings dialog box, and click Add 6) Change the ownership 7) Click OK as many times as needed
11 Disk Quotas: Summary Questions 1) The Computer Planning Committee at your company is working to project Windows Server 2003 disk capacity needs for the next two years, as part of the computer equipment budgeting process. Because you are part of the committee, they asked you if there is any way to gather statistics on present disk use over a three-month period to help in making projections. How can you obtain the statistics that they want? a) Turn on disk auditing for each user s account, and compile the audit report b) Set the default disk quota to a low number, and gather statistics based on the resulting reports that users are out of disk space c) Enable disk quotas, and after three months copy the disk quotas statistics into a file (e.g. spreadsheet or word processor file) d) There is no easy way to gather statistics except to ask all employees to calculate the space they use. 31 Disk Quotas: Summary Questions 2) The management in your organization wants to limit all employees to 7 MB of disk space, on each volume, which they can use to store files in shared folders and in home folders. What is the best way you can accomplish this? a) Set up a default disk quota of 7 MB on each shared volume. b) Set up a disk quota for each user via the Active Directory. c) Set up a default disk quota of 7 MB for each user account on each volume. 3) Sara and Richard each have a disk quota of 2 MB. Recently Sara has taken ownership of an 800 KB database file previously owned by Richard. How does this action affect their disk quotas? a) When ownership of a file is transferred, that file is exempt from the disk quota allotment. b) The disk quotas of Sara and Richard are unchanged. c) Sara s disk quota is now 2.8 MB, but Richard/ s stays the same. d) Sara has 800 KB less space out of the 2 MB quota, and Richard has 800 KB more. 32 Disk Quotas: Summary Questions 4) The lead research scientist in your company needs to work over the weekend to prepare information for a lecture he is presenting on Monday. He does not know how close he is to reaching his disk quota and is calling you to find out. How can you determine where he stands? a) There is no way to determine where he stands, but you can increase her quota to make sure there is no problem. b) Check the Quota Entries dialog box in the properties of the shared disk volume that he uses. c) Open the Command prompt window and use the Quota command along with his account name to find out
SHARING FILE SYSTEM RESOURCES
1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions
More information9 Administering Shared Folders
9 Administering Shared Folders Exam Objectives in this Chapter: Manage and troubleshoot access to shared folders. Create and remove shared folders. Why This Chapter Matters Control access to shared folders
More informationObjectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
More informationModule 12. Configuring and Managing Storage Technologies. Contents:
Configuring and Managing Storage Technologies 12-1 Module 12 Configuring and Managing Storage Technologies Contents: Lesson 1: Overview of Windows Server 2008 Storage Management 12-3 Lesson 2: Managing
More informationBACKUP & RESTORE (FILE SYSTEM)
Table of Contents Table of Contents... 1 Perform a Backup (File System)... 1 What Gets Backed Up... 2 What Does Not Get Backed Up... 3 Perform a Restore... 4 Perform a Backup (File System) The following
More informationCreating and Managing Shared Folders
Creating and Managing Shared Folders Microsoft threw all sorts of new services, features, and functions into Windows 2000 Server, but at the heart of it all was still the requirement to be a good file
More informationFile and Printer Sharing with Microsoft Windows
Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of
More informationLesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
More informationManage Filespace with the ARS Console
Academic Services Exeter IT Desktop Support Manage Filespace with the ARS Console Document reference: Document type: Document status: Review period: DS021 Desktop Support Procedure Live Six months Next
More informationWINDOWS 7 & HOMEGROUP
WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows
More informationCIFS Permissions Best Practices Nasuni Corporation Natick, MA
Nasuni Corporation Natick, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access
More informationUsing Microsoft Windows Encrypted File System (EFS)
Using Microsoft Windows Encrypted File System (EFS) Agenda Protecting our Data Types of Data What is EFS How to use EFS Best Practices Protecting our Data Two types of disk encryption: Full Disk Encryption
More informationCreate, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
More informationNetworking Lab - Vista Public Network Sharing
Networking Lab - Vista Public Network Sharing After completing the lab activity, you will be able to: Explain the differences between Windows XP and Windows Vista network sharing. Explain the purpose of
More informationIn the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.
QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationAppendix B Lab Setup Guide
JWCL031_appB_467-475.indd Page 467 5/12/08 11:02:46 PM user-s158 Appendix B Lab Setup Guide The Windows Server 2008 Applications Infrastructure Configuration title of the Microsoft Official Academic Course
More informationOnline Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationPGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
More informationOnline Backup Client User Manual
For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.
More informationRecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationNETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and
More informationWindows Clients and GoPrint Print Queues
Windows Clients and GoPrint Print Queues Overview The following tasks demonstrate how to configure shared network printers on Windows client machines in a Windows Active Directory Domain and Workgroup
More informationAcronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
More informationInstallation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
More informationDeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance
More informationXythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
More informationPRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE
PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are
More informationUser Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
More informationOnline Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationCreating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
More informationDeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 2. DeviceLock Service Deployment...6
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationMigrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1
Migrating Your Windows File Server to a CTERA Cloud Gateway Cloud Attached Storage February 2015 Version 4.1 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More information1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4
1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create
More informationIntroweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
More informationJetico Central Manager. Administrator Guide
Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number
More informationLenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
More informationInstalling Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials
Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure
More informationLepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
More informationNetwrix Auditor for File Servers
Netwrix Auditor for File Servers Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationEMC Celerra Network Server
EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com
More informationBackup and Restore with 3 rd Party Applications
Backup and Restore with 3 rd Party Applications Contents Introduction...1 Backup Software Capabilities...1 Backing up a Single Autodesk Vault Site...1 Backup Process...1 Restore Process...1 Backing up
More informationCreating Home Directories for Windows and Macintosh Computers
ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory
More informationManaging Applications, Services, Folders, and Libraries
Lesson 4 Managing Applications, Services, Folders, and Libraries Learning Objectives Students will learn to: Understand Local versus Network Applications Remove or Uninstall an Application Understand Group
More informationSymantec Backup Exec Desktop Laptop Option ( DLO )
The following is a short description of our backup software: BACKUP-EXEC-DLO. We have set many of the parameters for you but, if necessary, these parameters can be changed. Symantec Backup Exec Desktop
More informationAcronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE
Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution
More informationOffice of Information Technologies (OIT)
Office of Information Technologies (OIT) Encrypting File System (EFS) November 14th, 2007 Contents Introduction... 1 Benefits... 1 How it works... 1 Enabling EFS... 2 Step 1: Obtain an EFS key pair...
More informationTest Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients
Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,
More informationOnline Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
More informationSecurity. The user and group account information for LookoutDirect 4 is kept in the Lookout.sec file, installed in your Windows SYSTEM directory.
6 This chapter describes the two types of LookoutDirect operational security: network security and control security. Viewing security is primarily based in control security. You can use either or both
More informationCTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
More informationMicrosoft Network Operating Systems
7 Microsoft Network Operating Systems After studying this chapter, you will be able to: Identify the major differences between a Microsoft peer-to-peer network and a Microsoft client/server network. Discuss
More informationLab 5 Managing Access to Shared Folders
Islamic University of Gaza Computer Network Lab Faculty of engineering ECOM 4121 Computer Department. Prepared by : Eng. Eman R. Al-Kurdi Managing Access to Shared Folders Objective: Manage access to shared
More informationDigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide
DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide 1 of 7 DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide Process Overview Step Description
More informationExhIBIT 1 User Manager and Users Group
51-30-26 DATA COMMUNICATIONS MANAGEMENT SECURITY IN A WINDOWS NT ENVIRONMENT Gilbert Held INSIDE The User Manager, Creating a User Account, Comparing NT and NetWare Groups, Assigning Users to Groups, Working
More informationNETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationCTERA Agent for Linux
User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More information4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
More informationCloud Storage Service
Cloud Storage Service User Guide (Web Interface, Android App) Table of Content System Requirements...4 1.1Web Browser... 4 1.2Mobile Apps... 4 Accessing Cloud Storage using a Web Browser... 4 The Web Home
More informationRemote Storage Area (RSA) Basics
Remote Storage Area (RSA) Basics Table of Contents Remote Storage Area Overview... 3 What is Remote Storage Area?... 3 Who has access to RSA?... 3 How much space is available?... 3 Basic RSA Use... 4 How
More informationSophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012
Sophos Disk Encryption License migration guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Add encryption to an existing Sophos security solution...5 3 SDE/SGE 4.x
More informationMany home and small office networks exist for no
C H A P T E R Accessing and Sharing Network Resources Many home and small office networks exist for no other reason than to share a broadband Internet connection. The administrators of those networks attach
More informationServer & Workstation Installation of Client Profiles for Windows
C ase Manag e m e n t by C l i e n t P rofiles Server & Workstation Installation of Client Profiles for Windows T E C H N O L O G Y F O R T H E B U S I N E S S O F L A W General Notes to Prepare for Installing
More informationMTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.
STUDENT ACTIVITY 6.1: UNDERSTAND BACKUP AND RECOVERY METHODS MTA Course: 10753 Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.1 Lesson
More informationYale Software Library. PGP 9.6 for Windows
PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search
More informationNE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft
More informationAbout This Guide... 4. Signature Manager Outlook Edition Overview... 5
Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System
More informationGetting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A
Ascent Capture Internet Server 5 Getting Started with Ascent Capture Internet Server 5 10300260-000 Revision A Copyright Copyright 2001 Kofax Image Products. All Rights Reserved. Printed in USA. The information
More informationAccuGuard Desktop and AccuGuard Server User Guide
AccuGuard Desktop and AccuGuard Server User Guide 1 2 Table of Contents Welcome 4 Backup Simplified 5 Features 6 Protection Plans 7 Archived Data Viewing 8 Archived Data Restoring 9 Best Practices 11 Getting
More informationNetwork Setup Instructions
Network Setup Instructions This document provides technical details for setting up the Elite Salon & Spa Management program in a network environment. If you have any questions, please contact our Technical
More informationInstalling Windows XP Professional
CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows
More informationExam: 070-215 QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4
Exam: 070-215 QUESTION 1 You want to provide complete redundancy for all data stored on your hardware RAID-5 disk array. You install a second hardware RAID-5 disk array. You want to create a mirror of
More informationRole Based Administration for LDMS 9.0 SP2
Role Based Administration for LDMS 9.0 SP2 This article is designed to help you understand Role Based Administration for LDMS 9.0 SP2 and how to configure it. We will try to give you as much information
More informationGetting Started With Delegated Administration
Getting Started With Delegated Administration Delegated Administration (available with Websense v6.1 Corporate Editions) is a powerful tool for distributing filtering and reporting responsibilities for
More informationAcronis Backup & Recovery 11.5 Quick Start Guide
Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server
More informationScala InfoChannel Content Manager 5 Backup and Restore Instructions
4 Scala InfoChannel Content Manager 5 Backup and Restore Instructions This document describes how to backup and restore Scala InfoChannel Content Manager 5. Databases currently supported are: PostgreSQL
More informationInstallation Manual (MSI Version)
Installation Manual (MSI Version) 1. SYSTEM REQUIREMENTS... 2 2. INSTALLATION INSTRUCTIONS... 2 2.1 REMOTE INSTALLATION USING GROUP POLICY... 2 2.1.1 Assigning Software...2 2.1.2 Publishing Software...2
More informationInstalling Active Directory
Installing Active Directory 119 Installing Active Directory Installing Active Directory is an easy and straightforward process as long as you planned adequately and made the necessary decisions beforehand.
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationCONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR
CONFIGURING TARGET ACTIVE DIRECTORY DOMAIN FOR AUDIT BY NETWRIX AUDITOR TECHNICAL ARTICLE Product Version: 5.0 July 2013. Legal Notice The information in this publication is furnished for information use
More informationXcalibur. Foundation. Administrator Guide. Software Version 3.0
Xcalibur Foundation Administrator Guide Software Version 3.0 XCALI-97520 Revision A May 2013 2013 Thermo Fisher Scientific Inc. All rights reserved. LCquan, Watson LIMS, and Web Access are trademarks,
More informationOnline Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
More informationOnline Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
More informationFTP Service Reference
IceWarp Unified Communications Reference Version 11.3 Published on 1/6/2015 Contents... 3 About... 4 Reference... 5 General Tab... 5 Dialog... 6 FTP Site... 6 Users... 7 Groups... 11 Options... 14 Access...
More informationHOUR 3. Installing Windows Server 2003
HOUR 3 Installing Windows Server 2003 In this hour, we discuss the different types of Windows Server 2003 installations, such as upgrading an existing server or making a clean install on a server that
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
More informationSymantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
More informationEnterprise Apple Xserve Wiki and Blog using Active Directory. Table Of Contents. Prerequisites 1. Introduction 1
Table Of Contents Prerequisites 1 Introduction 1 Making the Xserve an Open Directory Master 2 Binding the Xserve to Active Directory 3 Creating a Certificate 3 Setting up Apache Web Server 4 Applying the
More informationInstallation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
More informationTrueEdit Remote Connection Brief
MicroPress Server Configuration Guide for Remote Applications Date Issued: February 3, 2009 Document Number: 45082597 TrueEdit Remote Connection Brief Background TrueEdit Remote (TER) is actually the same
More informationServer Installation: ServerTools
Server Installation: ServerTools ServerTools Page 1 Table of Contents To Install ServerTools...3 Backup and Restore...6 Purpose...6 Background...6 Requirements...6 Creating a Backup Schedule using the
More informationLepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
More informationInstallation Instructions Release Version 15.0 January 30 th, 2011
Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof
More informationActive Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
More informationComodo Cloud Drive Software Version 1.0
2 Comodo Cloud Drive Software Version 1.0 User Guide Guide Version 1.0 080613 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Cloud Drive...
More informationSynchronizer Installation
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
More information